INTERNATIONAL COLLEGE OF BUSINESS & TECHNOLOGY LTD ASSIGNMENT BRIEF PROGRAMME HND Computing and system development / Software Development UNIT NO 24 UNIT TITLE Networking Technologies ASSIGNMENT NO 01 ASSIGNMENT TITLE Building a Computer Network for ICBT campus. INDIVIDUAL/ Individual WORD COUNT - STUDENT ID HND/COM/11/ INTERNAL VERIFIER Prabu Premkumar GROUP STUDENT NAME ASSESSOR N Deenadayalan DATE SET 18/05/2016 SUBMISSION DATE 12/06/2016 RESUBMISSION DATE SUBMITTED DATE RESUBMITTED DATE FINAL GRADE ORIGINAL RESUBMISSION UNIT OUTCOMES COVERED LO1 Understand networking principles LO2 Understand networking components LO3 be able to design networked systems LO4 be able to implement and support networked systems AUTHENTICITY STATEMENT I,.................. hereby confirm that this assignment is my own work and not copied or plagiarized. All the sources, from which information has been obtained for this assignment, have been referenced. I further confirm that I have read and understood the rules and regulations out plagiarism and copying and agree to be bound by them. LEARNER SIGNATURE: DATE: 2 Grading opportunities available/achieved L01. 1 L01.2 L01.3 L02.1 L02.2 L02.3 L03.1 L03.2 L04.1 L04.2 D1.3 D2.3 D3.6 Original Submission Re submission SIGNATURE: Grading opportunities available/achieved DATE: L04.3 L04.4 L04.5 M1.1 M2.5 M3.1 Original Submission Re submission 3 Scenario Background The ICBT campus is an educational institute company that provides educational trainings, online exams on Information Technology, which has more than 2000 students in a one year of time. The company's primary business since 2000 has been providing computer services for customers. The company head office is the main place, which control courses. Addition to that the company has IT division, Vocational Training division, Undergraduate/Postgraduate centre. There is a Manager for each division. Users & Scalability of Divisions Head office 200 Computers Vocational Training Division 85 Computers Undergraduate/Postgraduate center 130 Computers IT Division 125 Computers Chairman - (Head Office) All the divisions must be interconnecting after the computerization project. If a student wants to communicate with their lectures or with management there must be a way to communicate, during 4 office hours. Online practical booking system and online payments should be possible. Currently telephone bills are in a high rate. After completing the computerization project a better communication is needed in a low cost. Requirement of students and management should be satisfied without violations. The employees will have separate logins and will be provided a common network drive where they can store their files, and the drive can be accessible from anywhere inside the company. We need to implement the remote accessibility feature for some of the employees to access the company network from outside. 5 Undergraduate/Postgraduate centreIt has two main sub divisions Sub Divisions Kids Division Coordinator We are having 30 personal computers. The growth of division has made the requirement of networking. In near future we are planning to implement new online courses for kids & they will have online exams on their courses. Multimedia Division Coordinator We are having 35 PCs and they do not have network connections on those. Growth of the needs (Such as high capacity files) has made the requirement of a LAN. We are now planning to implement our network. Communication with Head office for course details updates & accounting requirements is a cost effective thing, Due to the long distance telecommunication. The management of the company wants you to design a suitable network for them. You have been appointed as the Manager for the Computerization Project of the company's enterprise network. The ICBT campus management has requested you to research and produce a report for areas mentioned below. Note 1: - All answers should be based on the above scenario. 6 7 Tasks 1. Choose the right network architecture and the physical topology you would propose for the above company’s network technologies network. Discuss the benefits and limitations of your recommendations. (LO1.1) 2. Evaluate the impact on current technology standards and suggest one or more standards to the organization. (LO1.2) 3. Explain different routing protocols and choose appropriate one for the above scenarios?(LO1.3) 4. Critically discuss and select suitable hardware and software components needed for the above network infrastructure along with their functions. (LO2.1) 5. Discuss different between client and server machine, select different types of servers that is needed for the organization justify why? (LO2.2) 6. Discuss about the workstation hardware that you have chosen for the organization and give more emphasise to network compatibility (LO2.3) 7. Design a suitable network for your organization (LO 3.1) 8. Critically evaluate and justify the network design that has been created. Identify some applications for each department and then apply some required policies to control particular Domain users according to department requirement. Then get the feedback and document the related issues if found (LO 3.2) 9. Show the process of installing a server OS and setting up Active directory and DNS(LO4.1) 10. Demonstrate how you will add a workgroup computer to the domain you created by assigning appropriate IP address to the client pc and create network drives.(LO4.1) 11. Demonstrate the process of installing and configuring relevant servers needed for the organization(LO4.1) Provide a necessary network policy in selecting and configure relevant servers (M1.1) 12. Test your network to check if the system fulfils the user requirements and use a proper testing strategy (LO4.2) 13. Record and analyse your test results with the expected outputs. Discuss your findings.(LO4.3) 14. Recommend the enhancements you could include into this network in terms of hardware ,software , design and technology (LO4.4) Discuss most efficient and proper methods for remote accessibility (D3.6) 15. Design a maintenance schedule to support the network system which should include backups, upgrades, security and auditing policy.(LO4.5) Used appropriate method for backups, upgrades, security and auditing policy for you case study and justify why? (M2.1) 16. Self –evaluate your work related to this assignment by providing detailed lesson learned report (D1.3) 17. Provide a detailed description how you have planned managed the activities of assignment within the given time frame (D2.3) 18. The written tasks of the assignment must be delivered in a proper and standard report format (M3.1) 8 Note: Task 9,10,11,12 is covered in the practical evaluation test. Books Burgess M – Principles of Network and System Administration, 2nd Edition (John Wiley and Sons Ltd, 2003) ISBN 0470868074 Hallberg B – Networking: A Beginner’s Guide, 4th Edition (Osborne/McGraw-Hill US, 2005) ISBN 0072262125 Limoncelli T and Hogan C – The Practice of System and Network Administration (Addison Wesley, 2001) ISBN 0201702711 Lowe D – Networking All-in-One Desk Reference for Dummies, 2nd Edition (Hungry Minds Inc US, 2005) ISBN 0764599399 More M, Southwick P, Pritsky T and Riggs C – Telecommunications: A Beginner’s Guide (McGraw- Hill Education, 2001) ISBN 0072193565 Olifer N and Olifer V – Computer Networks: Principles, Technologies and Protocols for Network Design (John Wiley and Sons Ltd, 2005) ISBN 0470869828 Schiller J – Mobile Communications, 2nd Edition (Addison Wesley, 2003) ISBN 0321123816 Subramanian M – Network Management: An Introduction to Principles and Practice (Addison Wesley, 2000) ISBN 0201357429 Websites www.cisco.com www.howstuffworks.com www.webopedia.com 9 Instruction to Students 1. Please fill all the required entries on assignment cover sheet (Student Name, Student Number, Assessor’s name, Date submitted). 2. It is a MUST to maintain the word count specified (10% variation is acceptable). Not meeting the criteria for word count can result a penalty. 3. Answers should be clear, specific and self - reflective. 4. DO NOT COPY answers from Internet instead, paraphrase and quote using proper ways. 5. In-text citation and referencing should be done using Harvard Referencing System. 6. Please be cautious about the structures of the report and the essay. 7. Your Word documents can be in Word 2010 or an earlier version, and must be given filenames of the following format: 8. [Module Name] [Batch No] [Student Edexcel No] March 2015 [ICBT Number] [Student name].doc Eg: Network technology NW 70 Dec 2015 C/HND/NET/04/01-Ex1234 Weerakoon.doc” 9. Report need to be produced with academically accepted formatting guidelines. a. Paper A4 b. Font size : Headings 14pt, Bold; Normal font 12pt c. Font Face: Times New Roman or any other Serif Font face. d. Page Layout i. Margins Left 1.5”, right, bottom and top 1” ii. Page numbering bottom, right iii. Line spacing 1.5 e. Headings, Sub headings, figures and tables need to be numbered and labelled. If taken from another source, citation should be given at the bottom of the figure/table. 10. Please note that institute has very strict regulations on unfair practice and failing to follow regulations can result serious penalties. (refer to the student handbook for further details) GRADE DESCRIPTORS - This assignment provides opportunities to achieve a tick in all three merit grade descriptors and all three distinction grade descriptors 10 Outcomes/Criteria for PASS Evidence LO1 Understand networking principles Identify the correct requirements, and should show the Benefits of having a network. 1.1 Discuss the benefits and constraints of different networking systems types and topologies 1.2 Evaluate the impact of current network technology, communication and standards Properly make a discussion on IEEE standards and suggest the suitable one for the organization. 1.3 Discuss how protocols enable the effective utilization of different networking systems Discuss the usages of required protocol for the organization. LO2 Understand networking components You need to show valid point on software and hardware selection with acceptable cost benefit analysis. 2.1 Discuss the role of software and hardware components 2.2 Discuss server types and selection requirement Discuss all required type of servers and their needs to the organization. 2.3 Discuss the inter-dependence of workstation hardware with network components Make appropriate Hardware selection for client pcs. Page no Comments 11 LO3 Be able to design networked systems 3.1 Design a networked system to meet a given specification Design your network diagram and make clear discussion. Used MS Visio Software 3.2 Evaluate the design and analyse user feedback Show each valid polices that set on this domain and feedback that you collected. LO4 Be able to implement and support networked systems Need to provide required valid screenshots for your installation. 4.1 Implement a networked system based on a prepared design Observation Records 4.2 Test the network system to meet user requirements 4.3 Document and analyse test results against expected results 4.4 Recommend potential enhancements for the networked systems Written Report Attach your lesson learned sheet Written Report You can provide some good advance technology for the ICBT campus for future references. 12 4.5 Design a maintenance schedule to support the networked system. Written Report Grade descriptors for MERIT Evidence M1 Identify and apply strategies to find appropriate solutions. Observation Records: M1.1 Effective judgments have been made M2 Select/ design and apply appropriate methods/techniques M 2.1 The design methods/techniques has been justified M3 Present and communicate appropriate findings M3.1 The appropriate Structure and approach has been used. Write a proper report by mentioning network admin’s responsibilities also acceptable maintain plan. Page no Comments Page no Comments Effective decision in selecting and configuring relevant servers. Written Report: Effective maintenance schedule for the organization Written Report: Proper and standard report format. Justify your sever OS selection and discuss about your user groups and organization unite (OU). Provide suitable Harvard references list and citations Grade Descriptors for DISTINCTION Evidence D1 Use critical reflection to evaluate own work and justify valid conclusions Written Report: D1.3Self – Criticism approach has taken place D2 Take responsibility for managing and organizing activities Lesson learned report should be attached with proper conclusion Written Report: 13 D2.1 Autonomy/independence has been demonstrated Practical Observation and student must show proper screen shots for his/her own work. D2.3 Activities have been managed Identify activities, plan and tasks for the organization D3 Demonstrate convergent/ lateral / creative thinking Written Report: D3.6 Receptiveness to new ideas is evident Detail recommendations on the appropriate and innovative use of latest and emerging network technologies for the proposed network 14 Module name / No : ……………………………………………….. Student Name : ……………………………………………….. Student Number :……………………………………………...… Assessor Name :……………………………………………….. Date Area Covered Feedback Signature of the Assessor 15 Student signature ……………………………………… Date…………………… 16 Table of Contents Acknowledgement .............................................................................................................................. 19 Task 01 ........................................................................................................................................................ 20 1.1 Discuss the benefits and constraints of different networking systems types and topologies ............. 20 1.2 Evaluate the impact of current network technology, communication and standards ............................. 29 1.3 Discuss how protocols enable the effective utilization of different networking systems The ability to provide flexible connectivity options while keeping closed user groups (groups of users and resources isolated from non-group members) is vital in today's campus networks ..................................................... 32 Task 02 ........................................................................................................................................................ 34 Task 03 ........................................................................................................................................................ 46 3.2 Evaluate the design and analyses user feedback.................................................................................... 49 Task 04 ........................................................................................................................................................ 52 4.3 Document and analyses test results against expected results ............................................................ 56 4.4 Recommend potential enhancements for the networked systems ..................................................... 58 References ................................................................................................................................................... 63 Figure 1........................................................................................................................................................ 23 Figure 2........................................................................................................................................................ 25 Figure 3........................................................................................................................................................ 26 Figure 4........................................................................................................................................................ 27 Figure 5........................................................................................................................................................ 31 Figure 6........................................................................................................................................................ 35 Figure 7........................................................................................................................................................ 35 Figure 8........................................................................................................................................................ 36 Figure 9........................................................................................................................................................ 36 Figure 10...................................................................................................................................................... 38 Figure 11...................................................................................................................................................... 46 Figure 12...................................................................................................................................................... 47 Table 1 : Types of Network Traffic ............................................................................................................... 61 Table 2 : Workload Mixes 1.......................................................................................................................... 61 Table 3 : Workload Mixes 2.......................................................................................................................... 62 17 Acknowledgement I have taken efforts in this project. However, it would not have been possible without the kind support and help of many individuals and organizations. I would like to extend my sincere thanks to all of them. I am highly indebted to institute for their guidance and constant supervision as well as for providing necessary information regarding the project & also for their support in completing the Networking Technology assignment. I would like to express my gratitude towards my parents & member for their kind co-operation and encouragement which help me in completion of this project. I would like to express my special gratitude and thanks to industry persons for giving me such attention and time. My thanks and appreciations also go to my colleague in developing the project and people who have willingly helped me out with their abilities. 18 Task 01 1.1 Discuss the benefits and constraints of different networking systems types and topologies The use of technology in business can be a complex issue that requires a tremendous technical expertise and should be left to qualified professionals. In some cases, network and computer systems administrators may advocate the use of multiple operating systems. This is known as virtualization, which has a number of advantages, such as the ability to conserve energy or consolidate servers. Despite the advantages of running multiple operating systems, there are some disadvantages as well. Advantages and disadvantages of using different networks system and topologies The three basic types of networks include: LAN, MAN and WAN. Local Area Network A network is said to be Local Area Network (LAN) if it is confined relatively to a small area. It is generally limited to a building or a geographical area, expanding not more than a mile apart to other computers. Metropolitan Area Network Metropolitan Area Network (MAN) covers larger geographic areas, such as cities. Often used by local libraries and government agencies often to connect to citizens and private industries Wide Area Network Wide Area Networks (WANs) connect larger geographic areas .In this type of network dedicated transoceanic cabling or satellite uplinks may be used. Advantages Speed Sharing and transferring files within Networks are very rapid. Thus saving time, while maintaining the integrity of the file 19 Cost Individually licensed copies of many popular software programs can be costly. Networkable versions are available at considerable savings. Shared programs, on a network allows for easier upgrading of the program on one single file server, instead of upgrading individual workstations. Security Sensitive files and programs on a network are passwords protected (established for specific directories to restrict access to authorized users) or designated as "copy inhibit," so that you do not have to worry about illegal copying of programs. Centralized Software Management Software can be loaded on one computer (the file server) eliminating that need to spend time and energy installing updates and tracking files on independent computers throughout the building. Resource Sharing Resources such as, printers, fax machines and modems can be shared. Disadvantages Server faults stop applications being available Network faults can cause loss of data Network fault could lead to loss of resources User work dependent upon network System open to hackers Decisions tend to become centralized Could become inefficient Could degrade in performance Resources could be located too far from users Cost While it can be cost-effective to have multiple operating systems in the long run, in the shortterm it can be cost-prohibitive to establish a system based on more than one operating system. 20 While there are many different types of operating platforms that can be integrated and used in parallel with one another, it may be expensive to do so. Unless you are prepared to absorb the initial cost of using more than one system, you may need to hold off until it is not costprohibitive for your budget. Compatibility Compatibility is another potential issue that you are likely to run into when attempting to set up multiple operating systems. In some cases, the drivers you may need may not be available. This is generally true with newer operating systems, where the manufacturers are still running beta versions, or with really old operating systems, where the necessary drivers are no longer available. Compatibility issues sometimes arise also when sharing data between systems. Software and Support Another potential issue that is closely related to the compatibility issue is that of the potential difficulty in supporting and maintaining a system with multiple operating systems. The complexity of configuring support software can make it difficult for system administrators to integrate multiple operating systems. Even with some of the more-popular and well-known software vendors like Microsoft, the ability to support these complex systems can be overwhelming for even the most-advanced administrators. Opinions Outside of the technical difficulties of having multiple operating systems, another potential downfall of more than one operating system is sometimes seen in the attempt to have interagency cooperation. When one department or agency relies heavily upon one operating system and attempts to cooperate with another within the same organization, disagreements may occur over which system to utilize when completing certain tasks. Also, the same may be true regarding later decisions to upgrade systems or scrap one system over another. This may exist in both camps, and they may fight to keep their operating system at the expense of another. 21 Local Area Network: Local Area network is isolated network. Generally, it is built in a physical location. Such as office, home etc. Computers are connected to each other by a small server and also connected to the wide area network (Internet). This types of networks are very useful for sharing data likes files, small or big document, play network games etc. Metro Politian Area Network (MAN) Metropolitan area network is a large computer network where computers are connected with each other from different geographical location. Its structure and built process are quite similar with LAN the only difference its spans an entire city or a selected are like college or university campus or a commercial area. We can get a shared network connection form MAN. Wide Area Network (WANs) Wide area network is similar to a Local area network but here all other device connected to each other by fiber-optic cables, telephone line or a satellite links. Networking Topologies BUS Topology Bus topology is a network type in where every computer and network device is connected to single cable. Figure 1 22 Every node or device are individually linked up to successive other device or other node. It’s a very simple network but it has sum troubleshooting network issues. such as if a node is not working then how can anyone find the error node. Other way it has data redundancy issues. Features of Bus Topology It transmits data only in one direction Every device is connected to a single cable Advantages of Bus Topology It is cost effective Cable required is least compared to other network topology Used in small networks It is easy to understand Easy to expand joining two cables together Disadvantages of Bus Topology Cables fails then whole network fails If network traffic is heavy or nodes are more the performance of the network decreases Cable has a limited length It is slower than the ring topology RING Topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbors for each device. 23 It quite similar to bus network topologies. It has no termination like bus topologies. The main reason is that this topologies has no end it related to each other like a circle. Figure 2 This network has some fault such as difficulty of adding a new node to a token ring network. Features of Ring Topology A number of repeaters are used and the transmission is unidirectional Date is transferred in a sequential manner that is bit by bit Advantages of Ring Topology Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data Cheap to install and expand Disadvantages of Ring Topology Troubleshooting is difficult in ring topology Adding or deleting the computers disturbs the network activity 24 Failure of one computer disturbs the whole network Star In this network each and every node maintains an totally individual connection to a switch, where all other nodes are connected. It has a direct connection with switch to node. The weakness are need more wire to setup a network. In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node. Figure 3 Features of Star Topology Every node has its own dedicated connection to the hub Acts as a repeater for data flow Can be used with twisted pair, Optical Fibre or coaxial cable Advantages of Star Topology Fast performance with few nodes and low network traffic Hub can be upgraded easily 25 Easy to troubleshoot Easy to setup and modify Only that node is affected which has failed rest of the nodes can work smoothly Disadvantages of Star Topology Cost of installation is high Expensive to use MESH Topology It is a point-to-point connection to other nodes or devices. Traffic is carried only between two devices or nodes to which it is connected. Mesh has n (n-2)/2 physical channels to link hn devices. Figure 4 Types of Mesh Topology Partial Mesh Topology In this topology some of the systems are connected in the same fashion as mesh topology but some devices are only connected to two or three devices. Full Mesh Topology 26 Each and every nodes or devices are connected to each other. Features of Mesh Topology Fully connected Robust Not flexible Advantages of Mesh Topology Each connection can carry its own data load It is robust Fault is diagnosed easily Provides security and privacy Disadvantages of Mesh Topology Installation and configuration is difficult Cabling cost is more Bulk wiring is required In this topology every node connected with each other node. It generally used in wireless network. It need a large amount of overhead which very difficult to manage+ Hybrid This is simply a topology referring to the case where more than one topology is utilized. It is the combination of star and ring topology. 27 28 1.2 Evaluate the impact of current network technology, communication and standards In conceptual models & standards, the term has been used to distinguish distributed computing by smaller dispersed computers from the computer "monolith" of centralized mainframe computers. But this distinction has largely disappeared as mainframes and their applications turn to client / server model and become part of network computing. In the normal client / server model, one server, sometimes called a daemon,switched on and wait for customer demand. Typically,some program services from clients share a common server program. Both the client and server programs are often part of a larger program or application.In connection with the Internet,the proposed network design include web browser is a client requesting the service (delivery of web pages or files) from a web server (which is technically called a server or the HTTP Hypertext Transport Protocol) on another computer somewhere on the Internet. Similarly, the Water board Colombo center computer with TCP / IP installed allows you to make client requests for files from File Transfer Protocol (FTP) server on another computer on the Internet. Features such as exchange e-mail, web access and database access, built on client-server model. Users who access banking services from their computer using a client web browser to send requests to a web server in the bank. The program in turn transmits the request to its own database client program that sends requests to the database server at another bank computer to retrieve account information. The balance is returned to the bank's customer database, which in turn works back to the client web browser displays the results to the user.Client-server model has become one of the central idea of network computing. Many business applications written today use the client-server model. 29 Client / Server and Multi-tier Design in Water board Colombo center There is a client / server system is not only for the database. The Client / server design has a real and direct benefit to software developers, without the size of your system. The objective of this paper is to reveal the client / server to check the design considerations and technology, building the Water board Colombo center design that is own client or server systems. Proposed Server Hosting in Water board Colombo center While the core technology that powers many modern servers is based upon similar processors,the configuration and distribution of that computing power varies widely.When hosting your server in a data center and they want to host services such as email,VoIP,Video conferencing,intranet,ERP etc. From central office which is located in Sri Lanka to other regional offices at Indonesia,Malaysia,India and Singapore.It is important to have secure access to a central repository of client data because services are provided both on-site and from their base in Colombo. For both enterprise level companies as well as startups,selecting the right server configuration can mean substantial savings in terms of economic and computing efficiency. . 30 Figure 5 Proposed Server Hosting in Water board Colombo center While the core technology that powers many modern servers is based upon similar processors, the configuration and distribution of that computing power varies widely .When hosting your server in a data center and they want to host services such as email, VoIP, Video conferencing, intranet, ERP etc. The Water board Colombo center is an upcoming call center. It has 02 branches with the head office at Colombo and the other is located in Colombo. The building of the head office has 03 floors, and the Kandy is with 02 floors it is important to have secure access to a central repository of client data because services are provided both on-site and from their base in Colombo. For both enterprise level companies as well as startups, selecting the right server configuration can mean substantial savings in terms of economic and computing efficiency. 31 1.3 Discuss how protocols enable the effective utilization of different networking systems The ability to provide flexible connectivity options while keeping closed user groups (groups of users and resources isolated from non-group members) is vital in today's campus networks. The network virtualization-giving multiple groups access to the same physical network while keeping them logically separate to a degree that they have no visibility into other groups-is a requirement that has challenged network managers with in these proposed network design. Initially, virtual LANs (VLANs) and the Spanning Tree Protocol offered a mechanism to divide the LAN into virtual networks to address the need for separate workgroups within a common network. This solution was effective and secure, but it did not scale well, nor was it easy to manage as these campus LANs grew to encompass a large number of switches and global locations. Compelling Factors Many factors promote the requirement to create closed user groups. The following are just a few examples: Varying levels of access privileges within an enterprise Almost every enterprise needs solutions for granting different levels of access to customers, vendors, and partners as well as employees on the campus LAN. A visiting vendor, for instance, needs only to connect to the Internet while on campus, and the organization needs to help ensure that the vendor cannot gain access to corporate resources. Regulatory compliance Some businesses are required by laws or rules to separate segments of a larger organization. For example, in a financial company, banking needs to remain separate from trading. Office buildings commonly require the separation of different departments, such as human resources and customer service in a corporate setting, or a police department and a fire department in a municipal office building. 32 Network consolidation In mergers and acquisitions, there is often a need to integrate the acquired company's network expeditiously. Outsourcing As outsourcing and offshoring proliferate, subcontractors must demonstrate absolute isolation of information between clients. This is especially critical when a contractor services competing companies. The architecture of an end-to-end network virtualization solution targeted to satisfy the requirements listed above can be separated in the following three logical functional areas: Access control Path isolation Services edge Each area performs several functions and must interface with the other functional areas to provide the end-to-end solution. Connectivity Requirements The use of static ACLs at the edge of the network is the quickest way to provide traffic isolation, controlling and restricting communications between the various user groups. Most customers are comfortable with the use of ACLs to enforce security policies. At the same time,using ACLs is recommended only in very specific scenarios where the network connectivity requirements are hub-and-spoke (multi-to-one).The main limitation of the ACL approach is the lack of scalability.The complexity of each distributed ACL is directly related to two main factors: The number of user groups that need to be supported Connectivity requirements between user groups 33 Defining ACLs in scenarios with a large number of groups requiring any-to-any connectivity can quickly become cumbersome from a management point of view. The goal is to propose this approach when the connectivity requirement is hub-and-spoke, so that it is possible to create a portable ACL template to be used across different spoke devices. Two typical applications that require this type of connectivity are guest access (where the target is providing access to the Internet as a centralized resource),and Network Admission Control (NAC) remediation (where connectivity must be restricted between unhealthy endpoints and a centralized remediation server). Task 02 2.1 Discuss the role of software and hardware components There are servers provide computing power to facilitate transfer of data across a network to enable applications, operating systems, file transfer, email, printing and communications among client computers. Each particular type of server is generally defined by its configuration and software which enables it to communicate with intermediate client machines. As bandwidth rates have increased, modern servers can handle a larger number of requests, distributing data transfer across a series of servers through a cloud or cluster. Modern IT departments can work with a variety of computing configurations to get the very most out of their servers. Types of Server Hosting While the core technology that powers many modern servers is based upon similar processors, the configuration and distribution of that computing power varies widely. When hosting your server in a data center, you’re able to harness resources to optimize the efficiency of data transfer. For both enterprise level companies as well as startups, selecting the right server configuration can mean substantial savings in terms of economic and computing efficiency. 34 Shared As the single most economical form of hosting, server resources are shared across a wide variety of users. While users have the ability to access their own partition (even on a dedicated IP address), memory and transfer resources are shared across other sites. Figure 6 Virtual In recent years, virtual private servers (VPS) have become increasingly popular for users seeking an intermediate choice between shared and dedicated servers. Figure 7 http://www.iasl.com/images/2012/servermigrate.png(Accessed on - 2017/03/16) Server Application Types The application of server computing power to specific data needs has enabled hardware specialization to improve uptimes, efficiency and reliability of networks. While a given hardware 35 setup can often power multiple applications, many times data centers are organized around hardware for a specific purpose to make more efficiency use of the network. Web servers Web servers are optimized for data transfer speed, as well as security with extensive firewalls and incoming request filters to protect against denial of service attempts. Figure 8 Application Servers A subset of traditional data servers, application servers are designed to power frameworks which are involved in extensive processes related to a specific set of software. Application servers can power web-based apps, games, output from scripts and programs as well as serving data from an API (application protocol interface.) Figure 9 36 Specialized Servers File, Printer and Database Servers While modern servers often are involved in multiple tasks, specialized servers provide dedicated support for file transfer, printer communications and database queries. For specific types of uses, having a dedicated server for a specific purpose can speed up processing times and ensure sufficient resources are available during peak volumes. Media Servers With the growth of streaming audio and video, media servers provide an efficient way to transfer high bandwidth files online. For dedicated media firms, businesses and producers alike, investing in efficient hardware can lower operational costs from operating a server over time. Mail (Exchange) Servers Mail servers serve as an outbound client and inbound retrieval server for electronic messages, commonly via the STMP (simple mail transfer) protocol. Serving as a transfer agent (TA), mail servers as well Proxy Servers A proxy server like a middle man between a client and a real server, here client means a web browser such as Internet explorer or chrome. When a client make a inquiry then web browser its try to solve it, otherwise web browser forward the query to the real server. In this way a proxy server reduce search time. 37 Figure 10 38 2.2 Discuss server types and selection requirement The servers provide computing power to facilitate transfer of data across a network to enable applications, operating systems, file transfer, email, printing and communications among client computers. Each particular type of server is generally defined by its configuration and software which enables it to communicate with intermediate client machines. As bandwidth rates have increased, modern servers can handle a larger number of requests, distributing data transfer across a series of servers through a cloud or cluster. Modern IT departments can work with a variety of computing configurations to get the very most out of their servers. Types of Server Hosting While the core technology that powers many modern servers is based upon similar processors, the configuration and distribution of that computing power varies widely. When hosting your server in a data center, you’re able to harness resources to optimize the efficiency of data transfer. For both enterprise level companies as well as startups, selecting the right server configuration can mean substantial savings in terms of economic and computing efficiency. Shared As the single most economical form of hosting, server resources are shared across a wide variety of users. While users have the ability to access their own partition (even on a dedicated IP address), memory and transfer resources are shared across other sites. Virtual In recent years, virtual private servers (VPS) have become increasingly popular for users seeking an intermediate choice between shared and dedicated servers. 39 Server Application Types The application of server computing power to specific data needs has enabled hardware specialization to improve uptimes, efficiency and reliability of networks. While a given hardware setup can often power multiple applications, many times data centers are organized around hardware for a specific purpose to make more efficiency use of the network. Web servers Web servers are optimized for data transfer speed, as well as security with extensive firewalls and incoming request filters to protect against denial of service attempts. Application Servers A subset of traditional data servers, application servers are designed to power frameworks which are involved in extensive processes related to a specific set of software. Application servers can power web-based apps, games, output from scripts and programs as well as serving data from an API (application protocol interface.) 40 Specialized Servers File, Printer and Database Servers While modern servers often are involved in multiple tasks, specialized servers provide dedicated support for file transfer, printer communications and database queries. For specific types of uses, having a dedicated server for a specific purpose can speed up processing times and ensure sufficient resources are available during peak volumes. Media Servers With the growth of streaming audio and video, media servers provide an efficient way to transfer high bandwidth files online. For dedicated media firms, businesses and producers alike, investing in efficient hardware can lower operational costs from operating a server over time. Mail (Exchange) Servers Mail servers serve as an outbound client and inbound retrieval server for electronic messages, commonly via the STMP (simple mail transfer) protocol. Serving as a transfer agent (TA), mail servers as well Proxy Servers A proxy server like a middle man between a client and a real server, here client means a web browser such as Internet explorer or chrome. When a client make a inquiry then web browser its try to solve it, otherwise web browser forward the query to the real server. In this way a proxy server reduce search time. 41 Types of Network Protocols Ethernet This technology is an enhancement of bus topology. IEEE currently controls Ethernet standards. First it opens with the speed 10Mbps, later on it come with 100Mbps and now Gigabit Ethernet operated at 1000Mbps. According to bus topology in Ethernet multiple computers share the single link to communicate between them. They use CSMA/CD mechanism to become collision free during transmission Star topology It's a system where a single device connected to all accessing devices like HUB & SPOKE. HUB itself connected with all the SPOKEs. HUB accepts data from a sender an delivers to its appropriate receiver (SPOKE). Ring topology It's a system where all the computer are connected with each other like first computer is connected with second and so on until it reaches the last computer to connect with first one. Bus topology Computers are connected with a single long cable to communicate between them. The computers connect with this have communicate only one at a time. Token Ring It users the ring topology for communication. When a computer wants to communication it uses the token to send data. But it must be wait before the token arrives on its end then it stripes the token out of ring and send the data and after transmission it again insert the token on the ring to ensure that other stations which are going to communicate can use the token too. Fiber Distributed Data Interconnect (FDDI) - It's also uses a ring topology but it using two rings instead of one for communication. It operates 100Mbps so its faster than Ethernet. Two counter rotating rings prevent the data loss in link failure even the node failure. This technology is generally implemented in backbone 42 ATM (Asynchronous transfer mode)-ATM has been at first designed within the mid-1980s for only voice usage, data, in addition to video apps. ATM is top-speed networking regular created to support both voice in addition to data communications. ATM is usually used by the internet suppliers on the non-public long-distance networks. ATM works in layer 2 of OSI model which is data link layer over either fiber-optic or even twisted-pair cable. ATM technology is built to enhance use and in addition to QoS on top-traffic networks. Without routing and actually fixed-size cells, networks can easily deal with bandwidth below ATM. This works on the fixed-length cell of 53 bytes, as opposed to the variable-length packets which might be used by Ethernet. This permits for additional efficiency, as the devices do not have to fragment and in addition to reassemble big packets. The original ATM was already considerably faster than Ethernet; this surely could transfer voice, data, and in addition to video media signals on as much as 500Mbps. Now days it is actually quicker and it is being used by simply a big number of telecommunication and internet provider as a core layer or backbone. ATM, similar to almost every other technology, will probably at some point end up being exchanged by simply quicker successors. For a network Infrastructure software and hardware requirement are essential. In hardware point of view there are couple of list are included which is computers, router, switch, Ethernet cabling, wireless device, telephone. In below we will discuss of these hardware. Computer- This is use on workstation. But I will prefer laptop for user because its energy efficiency & move able. Router-Router actually works for control broadcast system. In our infrastructure we have three office all office stuff share our local office data, there is a interoffice connectivity so we need router for these. Switch - Switch is a layer two device. Using these control Spanning tree protocol. For mange user network we user manageable switch. 43 2.3 Discuss the inter-dependence of workstation hardware with network components In this design part of the report I provide the information about the requirement gathering from the Network design Management. The analysis of the raw requirement specifications and providing the specific requirements is reported. These specific requirements are designed into a network model and a WAN network model design is made. This standard is specified by the task group for 802.11b of IEEE in late 1999 by extending the WLAN standard 802.11 for the first time. To provide higher data rates 802.11b uses Complementary Code Keying modulation technique that makes efficient use of the ratio spectrum. This is first time to be more popular as WLAN standard which is adapted many organizations and many products supporting it are also been manufactured. Bandwidth This supports the 1Mbps, 2Mbps, 5.5 Mbps and 11Mbps bandwidth comparable to the traditional Ethernet networks. The boost of this speed from 1Mbps/2 Mbps to 11Mbps is by using DSSS (Direct Sequence Spread Spectrum) modulation. Wide area network is similar to a Local area network but here all other device connected to each other by fiber-optic cables, telephone line or a satellite links. Groups have been divided between one 28-port switch and one 16-port switch which are vLAN configurable and is IEEE 802.1Q compliant. So the three groups are Red, Yellow and Blue. While Red group and Yellow group are on same 28-port switch, Blue group is on different 16port switch. The switch used for red and yellow group should be of 28-ports as they require totally 25 ports and that are vLAN configurable and is IEEE 802.1Q compliant (12 ports for red group including server port and router, 13 ports for yellow group including router port). The switch used for blue group should be of 16-ports as they require 12 ports and that are vLAN configurable and is IEEE 802.1Q compliant (11 ports for the blue group including server port and a router port). 44 The router in this design is used to connect to the internet because it has the ability to interconnect two different network technologies. The router used in this design not only distributes the traffic flow but also allows network address translation and its vLAN compatible. External Connectivity and Design Explanation All users need access to the Email and Web. This is achieved by connecting 28-port layer 2 switch’s vLAN group Red to one of the router ports, and another vLAN group from same 28-port switch i.e. vLAN group Yellow to another router port. The vLAN group Blue which is on a 16-port switch is directly connected to another router port. The design also specifies that only users who need access to server should be given the authority. So the marketing specialists will not have access to any server so they are kept in different vLAN. The designers are given access to dedicated server, so the designers along with dedicated server are kept on a single vLAN and other users excluding marketing specialists are given access to database server, so they are kept in a separate vLAN. Therefore there has to be 3 different vLAN groups in order to satisfy this design. 45 Task 03 3.1 Design a networked system to meet a given specification Figure 11 : Network Diagram 46 LAN network Design for a Regional Department Figure 12 : LAN Design The Company Geographic distribution Departments to provide solutions which include new LAN design, security, Manageability and performance, The Company is also planning to implement IP phones using hosts configuration. Ethernet cable: 10Gbps 1000 base X The proposed Network Infrastructure expertise in the design and implementation of high-speed networks, remote access solutions, and wireless networks including: Business Requirement Assessment 47 WAN and LAN Infrastructure Design IP Architecture and Address Planning Wireless LAN Services Remote Access Solutions 3.2 Evaluate the design and analyses user feedback 48 The Network architecture or diagram is the plan of a connections network. It is a structure for the design of a networks physical mechanism and their functional association and design, its operational values and events, as well as data formats use in its function. In telecommunication, the plan of network architecture may also consist of a detailed report of products and services deliver via a communications network, as well as detail rate and billing structure under which services are compensated. The network diagram is a visual representation of network architecture. It maps out the structure of a network with a variety of different symbols and line connections. It is the ideal way to share the layout of a network because the visual presentation makes it easier for users to understand how items are connected as well. Types and Uses of Network Diagrams Bus Linear Ethernet Token ring topology Start Topology IP address is short for Internet Protocol (IP) address. An IP address is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination IP address is short for Internet Protocol (IP) address. An IP address is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination as well. The IPv4 is consist of four sets of numbers from 0 to 255, The total number of IPv4 addresses ranges from 000.000.000.000 to 255.255.255.255. Because 256 = 28, there are 28 x 4 or 4,294,967,296 possible IP addresses. While this may seem like a 49 large number, it is no longer enough to cover all the devices connected to the Internet around the world. Therefore, many devices now use IPv6 addresses. IPv6 The IPv6 address format is much different than the IPv6 format. It contains eight sets of four hexadecimal digits and uses colons to separate each block. An example of an IPv6 address is: 2602:0445:0000:0000:a93e:5ca7:81e2:5f9d. 50 Task 04 4.1 Implement a networked system based on a prepared design VLAN on 1 Switch Create two different VLANs. Check the visibility between hosts on different VLANs Asymmetric VLANs on 1 Switch Create three different asymmetric VLANs. Check the visibility between hosts Spanning Tree: Root Bridge Election Check the Root Bridge election between two switches with the same priority value, then assign a lower priority to one of them, and test which one becomes the Root Bridge. Spanning Tree: Root Path Cost Variation Test how the Root Path Cost changes after a topology variation. Spanning Tree: Port Blocking Check how Spanning Tree Protocol avoids formation of cycles in the network, blocking redundant links. Spanning Tree: Port Blocking and VLANs Check how Spanning Tree Protocol avoids formation of cycles in the network, blocking redundant links, in presence of VLANs too. Trunk IEEE 802.1Q Create a Trunk 1Q, carrying two VLANs between two switches. Multiple Spanning Tree: IEEE 802.1s Create two Spanning Tree instances bound to different VLANs. 51 Different Root Bridge for different MSTI Show that each MSTI can have a different Root Bridge. Visibility between different STP Regions Check visibility between different STP Regions with the same VLANs. Root Bridge Election for CST & CIST Create two or more different regions and check which bridge is the Root Bridge for CST (Common Spanning Tree) and which one is the Root Bridge for CIST (Common Instance Spanning Tree). VLAN & Link Aggregation Analyze the Network with Link Aggregation Control Protocol (802.3ad) enabled and disabled. More VLANs & Link Aggregation Analyze the Network with Link Aggregation Control Protocol (802.3ad) enabled and disabled, in presence of more VLANs too. Port Mirroring Verify the functionality called Port Mirroring on switch Enterasys entry level. Configuration BPDU Use the port mirroring functionality in order to analyze the packages of type configuration BPDU exchanges between entry level Enterasys switches. Topology Change BPDU Use the port mirroring functionality in order to analyze the Topology Change Notification packets exchanged between entry level Enterasys switches. 52 Tagged BPDU Use and hub connected to a PC and two switches in order to analyze the IEEE 802.1Q packets exchanged between entry level Enterasys switches. Policy Classification Verify the functionality called Policy Classification on entry level Enterasys switches. MST instances Verify the functioning of creation of MST instance on entry level Enterasys switches. Root Cost in MST Region Analyze the root cost in MST Region on entry level Enterasys switches. BPDU MST Analyze the BPDU MST on entry level Enterasys switches Topology Change in MST 1 Inspect the behavior of an MST switch when it is connected to a traditional ST switch. Topology Change in MST 2 Inspect the behavior of an MST switch when it is connected to another MST switch of the same region. Topology Change in MST 3 Inspect the behavior of an MST switch when it is connected to an MST switch of another region. 53 4.2 Test the network system to meet user requirements The most important feature of these industrial networks is that they guarantee bounded transmission delays. However, NCSs based on industrial standards suffer from some disadvantages, like high installation and maintenance costs, excessive weight of physical links and difficulties with scalability and redundancy. One of the solutions enabling partial avoidance of these problems is application of standard, inexpensive, easy to purchase and replace devices typically used for office networking. To this class belongs Ethernet which currently dominates general networking and seems to become an industrial standard in the nearest future. The guided media, that form a basis of today plants, although quite reliable in nature, have several disadvantages like limited scalability, quite high installation and maintenance costs, low flexibility. Networks are more and more often applied in new domains, where usage of guided media is impossible or inconvenient. Such solutions based on 802.11 (Gast, 2005; WAVE), 802.15 (Gislason, 2008; Bluetooth Specification, ZigBee Specification, 2008), or proprietary technologies are relatively inexpensive, easy to deploy, and often allow to avoid installation of power supply cables. Some of them are commercially available like WISA (Frey, 2008). The wireless media however suffer from low reliability, limited capacity and are prone to noise and interferences. It is well known that incorrect operation of the control system due to some hardware failure can be dangerous or even catastrophic. Therefore in order to increase reliability of computer controlled systems, redundancy realized by duplication or multiplication of sensors, actuators and selected processing units is applied, especially in the case of systems responsible for control of critical processes. In network based control systems situation is additionally complicated by the possibility of network failures and stochastically time-varying transmission delays introduced into feedback loops by a network. Hence, resiliency of communication is crucial for satisfactory operation of these systems. 54 4.3 Document and analyses test results against expected results DATA center Access control Access control is the methods for imposing controls that allow or deny user access to network resources, usually based on a user’s account or a group to which the user belongs. Access control is security features that determine which resources users are permitted to access, what type of access they are allowed, and how many simultaneous users can access a resource at the same time. They ensure data privacy and protection and help maintain a productive computing environment User authentication User authentication is a security feature that allows an administrator to control who has access to the network and what users can do after they are logged on to the network. This might involve confirming the identity of a person, the origins of an object, or assuring that a computer program is a trusted one. Authentication is the process of determining the identity of a network user by verifying a set of user credentials, typically a user ID and password Firewalls A firewall is a combination of hardware and software components that provide a protective barrier between networks with different security levels. Rules for transmitting and receiving information to and from the other network can be established for the firewall so that specific types of items or addresses are not allowed to pass between the networks. It sits between the computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block 55 Virus protection Virus protection means securing data from viruses that is designed to destroy data or make the computer or network operate inefficiently. Computer viruses are the programs that must be triggered or executed before they can infect the computer system and spread to others. Accessing the internet Accessing the internet is the telephone communication system that also covers the world linking telephones together. As with the telephone system, each device attached to the network can be reached through a unique code that represents that device’s location. 56 4.4 Recommend potential enhancements for the networked systems These are the preventative maintenance tasks are performed on: Server and storage infrastructure Desktop infrastructure Network equipment Backup and security systems Each maintenance task can be performed at a standard frequency or on a specific nominated basis appropriate for your environment. These tasks include: Patch management Log files review and corrective action Security vulnerability testing Anti-Virus and Anti-Spam management Active directory account review Archiving and data file management Analyze with the Server Logs Compare event logs errors and warnings against database of known errors. Investigate any "unknown" errors for severity. Escalate any appropriate errors as Incidents via maintenance team. Server Patching Review Critical updates and prepare for periodic application: Confirm a suitable Change Window with the client, check backups, apply critical patches, reboot, and test server functions. Optionally apply non-critical patches depending on server role 57 Server Disk Capacity Check remaining disk capacity, all relevant partitions. Establish and maintain relevant free disk space alert thresholds. Escalate any disk space threshold breaches as Incidents. Server Optimization Review the server for overall performance Examine disk I/O, RAM, CPU, check fragmentation, perform relevant clean-up tasks Database maintenance Monitor MS Exchange and MS SQL server database size, Check Message queue length, Check running processes. Hardware components The computers should have a minimum 2GHz Pentium 4s or better, A hard disk of each computer should be minimum of 20 GB so that i can store the required data to run the network features effectively. The required amount of RAM depends upon the operating system install on each computer. In case each computer is having windows-7 then the required amount of RAM should be 2-GB. It is mandatory that each system operating system is updated with latest service pack. Dedicate Servers in a Network In a network dedicated server helps in making the network faster and easier to work with more reliability. In a network a dedicated server helps in reducing the cost in an organization as a reason that no other computer would be required that is biggest and fastest as a server. Here are the different servers that would be used in the organization: File Server In any organizational network a file server provide centralized disk storage so that the client can easily store their data over the file server. The purpose of the file server is to store and share files and program over the network so that client can’t easily access them whenever they required. 58 File server also helps in preventing the users to update a single file at a same time. For database file the lock can be applied so that the information regarding the organization can be protected. Print Server In any organization reduction of cost is the main emphasis. A dedicated server computer can be use as a print server whose main purpose is to collect information being sent to a shared printer by client and print it in an orderly manner. Web Server A Web server is a server computer that runs software that enables the computer to host an Internet Web site. The two most popular Web server programs are Microsoft IIS (Internet Information Services) and Apache, an open-source. Mail Server A mail server is a server computer that handles the network’s e-mail needs. It’s configured with e-mail server software, such as Microsoft Exchange Server. Mail-server software must be compatible with e-mail program; Exchange Server, for example, is designed to work with Microsoft Outlook, the e-mail client software that comes with Microsoft Office. Database Server A database server is a server computer that runs database software, such as Microsoft SQL Server 2005. Database servers are usually used along with customized business applications, such as accounting or marketing systems. 59 Different types of network traffic used by different departments Finance Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light Marketing Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light HR Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light IT Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light Legal Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light Heavy/Light Table 1 : Types of Network Traffic Workload Mixes Below three charts are containing the different workload mixes types with different time phase and traffic levels. Workload Mixes 1 89.30a.m to 11.30p.m Applications Data Base Server Email application File Transfer File Print server Telnet protocol Video Conferencing Finance Heavy Light Heavy Heavy Light Marketing Light Light Heavy Heavy Light HR Heavy Light Light Heavy Heavy IT Heavy Light Light Heavy Light Legal Heavy Heavy Heavy Heavy Light service Website application Light Heavy Light Light Heavy Light Light Heavy Light Heavy Table 2 : Workload Mixes 1 Workload Mixes 2 Applications Data Base Server Email application File Transfer 12.30p.m to 3.30p.m Finance Heavy Heavy Light Marketing Light Light Light HR Light Heavy Heavy IT Heavy Light Light Legal Light Light Heavy 60 File Print Telnet Video Con. Web Heavy Light Heavy Heavy Heavy Heavy Light Heavy Light Heavy Light Light Heavy Light Light Light Light Light Light Heavy Table 3 : Workload Mixes 2 References [1] Berkelaar, B.L. (2009). No punctuation: Searching for an architecture of time in the culture of efficiency. In S. Kleinman (Ed.), The culture of efficiency (pp. 88-105). New York: Peter Lang. [2] Browning, L. D, Greene, R. W., Sitkin, S. B., Sutcillffe, K. M.m & Obstfeld, D. (2009). Constitutive complexity: Military entrepreneurs and the synthetic character of [3] communication flows. In L. L. Putnam and A. M. Nicotera (Eds.), Building Theories of organization: The constitutive role of Communication. New York: Routledge. 61 [4] Kisselburgh, L., Berkelaar, B. L., & Buzzanell, P. M. (2009). Discourse, gender, and the meanings of work: Rearticulating science, technology, and engineering careers through communicative lenses. In C. Beck (Ed.), Communication yearbook 33 (pp. 258-299). New York: Routledge. [5] Peña, J., & Hancock, J. T., & Merola, N. A. (2009). The priming effects of avatars in virtual settings. Communication Research, 36, 838-856. [6] Putnam, L., Kisselburgh, L., Berkelaar, B., Buzzanell, P. M., Mastronardi, M., Jackson, M., Stoltzfus, K., Jorgenson, J., & Wang, J. (2009). Conversations about women in STEM careers: [7] The impact of communication research in creating occupational and social change in a global information economy. In L. Harter, M. Dutta, & C. Cole (Eds.), Communicating for social impact: Engaging communication theory, research, and pedagogy (pp. 47-62). Cresskill, NJ: Hampton. [8] Shapiro, M. A., & Peña, J. (2009). Generalizability and validity in video game research. In U. Ritterfeld, M. J. Cody, & P. Vorderer (Eds.), Serious games: Mechanisms and effects (pp. 389403). Mahwah, NJ: Lawrence Erlbaum. [9] Stephens, K. K., & Davis, J. D. (2009). The social influences on electronic multitasking in organizational meetings. Management Communication Quarterly, 23, 63-83. [10] Stephens, K. K., & Malone, P. (2009). If the organizations won’t give us information…: The use of multiple new media for crisis technical translation and dialogue. 62